Skip to content

Identifying Digital Evidence from Android Devices via Static and Dynamic Analysis

Type: Webinar
Research Area: Digital

This CSAFE Center Wide webinar was presented on June 25, 2019 by Dr. Yong Guan, CSAFE researcher at Iowa State University.

Presentation Description:

The over 50 app stores across the world provides mobile phone users with access to 8 million apps, each with the potential to house important forensic evidence. It is not possible for digital forensic practitioners to develop sufficient expert knowledge about every single app on the market. As a result, this often prevents timely and reliable discovery of forensic evidence, leading to backlogs in most crime laboratories. Researchers will discuss EviHunter, a new forensic Android app analysis toolset, and with it, build the likely largest Android App Forensic Evidence Database, to assist crime investigators to solve these issues.

 

Related Resources

Source Camera Identification with Multi-Camera Smartphones

Source Camera Identification with Multi-Camera Smartphones

An overview of source camera identification on multi-camera smartphones, and introduction to the new CSAFE multi-camera smartphone image database, and a summary of recent results on the iPhone 14 Pro’s.
An Anti-Fuzzing Approach for Android Apps

An Anti-Fuzzing Approach for Android Apps

One of significant mobile app forensic analysis problems is the app evidence extraction from the device. Given the fact that mobile apps could generate more than 19K files in a…
Forensic Analysis of Android Cryptocurrency Wallet Applications

Forensic Analysis of Android Cryptocurrency Wallet Applications

Crypto wallet apps that integrate with various block-chains allow the users to make digital currencies transaction with QR codes. According to reports from financesonline [3], there is over 68 million…
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information

Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information

The conventional information leakage metrics assume that an adversary has complete knowledge of the distribution of the mechanism used to disclose information correlated with the sensitive attributes of a system.…